Commentary in-line, minor nits on GitHub incoming.

Thanks,
Tommy

On 8/1/25 20:03, Nick Buraglio wrote:

[no hat]

Thank you for writing this document. It is well written, comprehensive, and solves a problem. Along with what Phillip wrote, which I agree with, here are my notes from reading the latest version.

Section 4:

|With the final exhaustion of IPv4 pools in RIRs, e.g., [RIPEV4], and the progressing deployment of IPv6, there no longer is a "preferred" IP version. |

The use of the term "preferred" could be confusing here and I would argue that defining it is very context specific. Suggest quantifying "preferred" to add some context or re-wording that sentence. While perhaps a somewhat edge case, I could see someone reading that and applying the context of source address selection and being confused by behavior. You clarify this a bit in section 4.3, but perhaps it could be clarified higher in the doc?

Section 4.2

|If a recursive DNS resolver runs in a network that uses XLAT [RFC6877], and the recursive DNS resolver is aware of the used PREF64 [RFC6146], it SHOULD synthesize mapped IPv6 addresses for remote |

Suggest re-wording this to something like

|If a recursive DNS resolver operates in a network that uses XLAT [RFC6877], and the recursive DNS resolver is aware of the PREF64 [RFC6146] in use in its administrative domain, .... |

Section 4.3

|(DHCPv4, DHCPv6, SLAAC). |

Should these be defined, referenced, or at least explained? PREF64 and XLAT RFC are referenced in section 4.2.

Always a fan of definition references, especially as I was reminded of this by the RFC Editor yesterday for a different draft.

On Tue, Jul 29, 2025 at 7:51 AM Tobias Fiebig <[email protected]> wrote:

    Moin,

    > Section 3.2:
    > - The draft suggests to use an MSS of 1240 bytes for IPv4 and 1220
    > bytes
    >   for IPv6 to avoid MTU blackholes on TCP, but in the next
    paragraph
    >   also mentions the problems that may arise due to the use of
    NAT64.
    >   Why not always use an MSS of 1220 and be safe?
    >   -> Same argument also applies to Section 4.1

    This kind of makes sense. I will change it in the working copy for
    now.
    However, it would be nice to hear some more opinions on this from the
    list.

I support this change also.


    > Section 4.1:
    > - While there still are people using transition technology like
    > Teredo,
    >   6to4 or ISATAP, I would prefer having no IPv6 authoritative DNS
    >   over one realized using any of these. Especially ISATAP allows to
    > build
    >   interesting circular dependencies.
    >   Should the draft recommend only using native IPv6 for
    authoritative
    > DNS servers?
    > - Does it make sense tor recommend the same for IPv4?

    I would pick this up for only v6 for now; v4 is messy enough
    already...

    I put in: "Authoritative DNS servers <bcp14>SHOULD NOT</bcp14> use
    addresses from IPv6 transition technologies to be reachable." for now.

I agree with the spirit of the change but find this sentence a little confusing. Noting I tend to prefer verbosity, I'd suggest but not insist on something like: "Authoritative DNS servers <bcp14>SHOULD</bcp14> use native IPv6 addresses instead of IPv6 addresses synthesized using IPv6 transition technologies to avoid reachability issues."


    > Section 4.3:
    > - The recommendation about preferring IPv6 recursive resolvers
    >   does not match the implemented base, which usually prefers
    > resolvers
    >   learned over DHCP over resolvers learned through SLAAC.

    Yes, this is very much an implementation question; Also, e.g., if a v4
    and v6 resolver have been learned via DHCPv4 and DHCPv6 respectively
    etc.

    I would argue that preferring non-synthesized v6 over synthesized v6
    (only of known to the client!) is still a reasonable recommendation
    going forward.

    > - The recommendations for the NAT64/PREF64/IPv6-mostly case seem
    > reasonable,
    >   but could use some untangling between PREF64, IPv6-mostly NAT64, …
    >   I would suggest talking about NAT64 connectivity discovered
    through
    > PREF64 or RFC7050.

    I just went over the text and aligned this a bit more, also using more
    similar text for the stub/full resolver cases. Please take a look in
    the git repo.

    With best regards,
    Tobias


-- Dr.-Ing. Tobias Fiebig
    T +31 616 80 98 99
    M [email protected]
    Pronouns: he/him/his

    _______________________________________________
    DNSOP mailing list -- [email protected]
    To unsubscribe send an email to [email protected]


_______________________________________________
DNSOP mailing list [email protected]
To unsubscribe send an email [email protected]
_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to